EP2556646B1 - Verfahren zum zugriff auf einem ausgestrahlten datenflusses - Google Patents

Verfahren zum zugriff auf einem ausgestrahlten datenflusses Download PDF

Info

Publication number
EP2556646B1
EP2556646B1 EP11719332.6A EP11719332A EP2556646B1 EP 2556646 B1 EP2556646 B1 EP 2556646B1 EP 11719332 A EP11719332 A EP 11719332A EP 2556646 B1 EP2556646 B1 EP 2556646B1
Authority
EP
European Patent Office
Prior art keywords
user
access
message
request
broadcast
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP11719332.6A
Other languages
English (en)
French (fr)
Other versions
EP2556646A1 (de
Inventor
Jean-Baptiste Hennequin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
Orange SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=43466908&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP2556646(B1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Orange SA filed Critical Orange SA
Publication of EP2556646A1 publication Critical patent/EP2556646A1/de
Application granted granted Critical
Publication of EP2556646B1 publication Critical patent/EP2556646B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/2585Generation of a revocation list, e.g. of client devices involved in piracy acts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • H04N21/6582Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number

Definitions

  • the invention lies in the field of telecommunications and more particularly in the field of television in an IP (Internet Protocol) type network.
  • IP Internet Protocol
  • the invention finds a particularly advantageous application in the field of IP networks for broadcasting audiovisual data, in particular when accessing a multicast content broadcasting service according to the mechanisms defined in the domain of the IMS (" IP Multimedia Subsystem ") by 3GPP (3rd Generation Partnership Project) and TISPAN (Telecommunications and Internet Converged Services and Protocols for Advanced Networking) standards organizations.
  • IMS IP Multimedia Subsystem
  • 3GPP 3rd Generation Partnership Project
  • TISPAN Telecommunications and Internet Converged Services and Protocols for Advanced Networking
  • the document US 2005/0220132 presents a system in a network of data packets controlling access to broadcast streams to process a request from a user requesting an unauthorized stream.
  • the IMS is a network architecture that allows establishment and control of a multimedia session as well as resource reservation at the media stream transport network level. This network architecture also allows the implementation of an interaction between services.
  • the technical specifications ETSI TS 182 027 and TS 183 063 defined by the TISPAN group describe the IPTV architectures on an IMS architecture and mechanisms enabling a user's terminal to access a content broadcast service in the mode.
  • multicast for example "TV Broadcast”.
  • For a data flow is defined a broadcast address or multicast address that allows a user to receive the broadcast stream.
  • a service platform implementing this service checks whether the user has the right to access the service and then restricts this access to a service. list of data flows according to his subscription. The user's terminal then obtains from the service platform a list of broadcast addresses or multicast addresses respectively associated with the data streams of the list.
  • a P-CSCF Proxy Call Session Control Function is responsible for sending a request for resources to destination of a resource control subsystem or RACS, for "Resource and Admission Control Subsystem", to implement an admission control and / or resource control function.
  • RACS resource control subsystem
  • Such a subsystem is specified by the TISPAN group in ETSI ES 282 003.
  • This RACS resource control subsystem will evaluate the resource request transmitted by the P-CSCF and is able to configure a device in the plan. transfer.
  • Such equipment is in charge of distributing the data flows to the users who requested it.
  • the resource request between the P-CSCF session controller and the RACS subsystem may include a description of the list of allowed multicast addresses for the user.
  • the command between the RACS subsystem and the transfer plan equipment may include the description of a filter to be installed on the equipment of the transfer plan.
  • This filter composed of multicast filtering rules, defines multicast addresses to which the user's terminal is entitled to access.
  • the filter includes multicast addresses to which the user's terminal is not allowed to access.
  • the equipment of the transfer plan is then in charge of the processing of requests for access to multicast addresses issued by the user via the multicast signaling protocol, such as IGMP ("Internet Group Management Protocol"), and can accept or deny requests for access based on the rules of the installed filter.
  • IGMP Internet Group Management Protocol
  • the implementation of the RACS subsystem requires the setting up of a new function in the network but also the updating or the replacement of the equipment of the transfer plan so that they can be ordered and configured since the RACS subsystem.
  • the impact of the implementation of such a "TV Broadcast" service on the network of an operator is therefore important.
  • One of the aims of the invention is to remedy the shortcomings / disadvantages of the state of the art and / or to make improvements thereto.
  • the network access device is itself in charge of implementing access control to broadcast data streams. It is easy to integrate such a function in the network access device and the upgrade can be performed by downloading a new software version.
  • Such a network access device is for example a residential gateway. It allows access to a communication network to a set of user terminals located in a home network.
  • the access control method takes advantage of the privileged location of the network access device and the functions it implements. Indeed, in a particular mode of realization, the network access device implements an agent function for the signaling relating to the session, for example according to the SIP protocol, for "Session Initiation Protocol", in charge of relaying the SIP signaling and the sessions established with network service platforms, and a proxy or "proxy" function for the Multicast, IGMP or MLD signaling protocol, for "Multicast Listener Discovery", in charge of relaying signaling according to the multicast signaling protocol from or to the user's terminal.
  • the network access device can obtain session-related signaling of a set or list of allowed broadcast data streams for a user and then implement access control at the proxy function level for the user.
  • the access control method according to the invention does not require control of the network access device by one of the network equipment. It is completely autonomous to obtain access control information, and then implement this access control. With the access control method described above, it is possible to deport the access control to the network access device and thus to avoid upgrades of the equipment in the transfer plan.
  • the rejection of the access request can be explicit, that is to say with user notification, or implicit.
  • the access request is rejected, it is blocked by the access control device and is not propagated to the communication network.
  • the unauthorized data flow is not transmitted to the user's terminal, since the access request has been blocked.
  • Requests for access to authorized flows for the user are in turn transmitted in the communication network and the transmission of the authorized data flow is carried out by the first equipment of the transfer plan, able to process the access request. .
  • the access control method is compatible with mechanisms for scrambling the data streams.
  • even unauthorized data flows are routed to the user's terminal. However, they can not be returned in clear by the terminal of the user in the absence of possession of a scrambling key. Their routing to the user's terminal then leads to an unnecessary network load.
  • a malicious user may also record the unauthorized data stream in order to subsequently attempt to determine the scrambling key and thus return it unencrypted.
  • the access control method as described above thus makes it possible to limit the load of the links to the access gateway to the network and to reinforce the protection of the broadcast data streams.
  • the access control method is compatible with the existing mechanisms for the "TV Broadcast" service, both at the establishment and control of the sessions relating to the service, as well as that of the multicast signaling protocol. .
  • the set of authorized data flows is for example obtained from an application session opening agreement message, a modification message of the application session.
  • the set of authorized data streams is extracted from the message.
  • the set of authorized data flows is derived from a set of forbidden data flows, extracted from the agreement message opening the application session.
  • the access control method further comprises a step of recording in an array of said set obtained in association with the user.
  • the set of authorized data flows is registered in association with a user's identifier to enable subsequent requests for access by that user to be processed.
  • the identifier of the user may be composed of an IMS public identifier, IMPU for "IP Multimedia Public Identity", and / or the IP address of the user's terminal.
  • the access control method further comprises, on receiving a release message from the application session, a step of deleting the table of the record associated with the user.
  • the invention relates to a system for accessing a broadcast data stream, comprising a device for access by a user to a broadcast data stream as described above and at least one network device, arranged to broadcast said data stream.
  • the invention also relates to a computer program comprising instructions for implementing the access control method as described above, implemented by an access device, when this program is executed. by a processor.
  • a device for accessing a communication network 10 in its environment will be described in relation to the figure 1 according to a particular embodiment.
  • the network access device 10 allows access to the communication network to user terminals 20, 22 of a local, home or private network. More precisely, it is placed later in the case where this access device to the communication network is a residential gateway.
  • the user terminals 20, 22 are also known under the name "STB" for "Set Top Box”. They have functions for initializing and managing IPTV services on an IMS architecture. As such, these terminals are identified as the applicants or users when accessing a broadcast or multicast data stream. Such a stream of data broadcast is called thereafter "multicast stream”.
  • IGMP multicast signaling protocol This protocol is more specifically described in the IETF documents (RFC 1112, RFC 2236 and RFC 3376), and no limitation is attached to the use of this protocol, for example the description is easily transferable to other Multicast protocols, such as MLD, for Multicast Listener Discovery, which is the equivalent of IGMP for an IPv6-based communication network
  • MLD Multicast Listener Discovery
  • MLDv1 equivalent to IGMPv2 in terms of functionality and described in IETF RFC 2710
  • MLDv2 is equivalent to IGMPv3 in terms of functionality and described in IETF RFC 3810.
  • the first entity 12 of the gateway 10 communicates with an IMS core network 30 and a service platform or application server 34 offering a "TV Broadcast" service.
  • the core IMS network 30 includes a set of CSCF proxy servers in charge of routing SIP signaling messages between users or between a user and the service platforms.
  • the IMS core network 30 is based on an IP transfer plan 36.
  • a transfer plan 36 comprises transfer equipment 32, which has multicast routing functions, making it possible to implement the replication and broadcasting of data streams.
  • broadcast data corresponding for example to television channels, following requests for user access.
  • the packets of a multicast stream are broadcast using a particular destination IP address, called "multicast address".
  • a multicast stream is characterized by a source address and a group address. Each multicast stream is thus represented by a single pair (S, G). Two separate multicast streams may have the same source address S or the same group address G.
  • the multicast stream is transmitted to at least one user terminal following the reception from it of an "Membership report" message specifying the source address and the group address.
  • the first device 32 of the transfer plan 36 capable of interpreting this message transmits the required multicast stream on the link from which the request originates.
  • a multicast stream request can also refer to a set of sources for a given group. We then speak of flows (*, G) corresponding to a sum of the flows emitted by different sources on the same group G.
  • the method of controlling access to a broadcast data stream will now be described in relation to the figure 2 , representing a phase of establishment of an application session for access to a "TV Broadcast” service, the figure 3 , representing a phase of TV channel change and the figure 4 , representing a release phase of the application session for access to the "TV Broadcast” service.
  • the description is made using the IPTV IMS mechanisms as described by the specifications of ETSI TISPAN for illustrative purposes.
  • the user terminal 20 transmits a message M1 requesting an opening of an application session relating to the service "TV Broadcast" to the gateway 10.
  • This is a SIP INVITE login request including a first identifier of the user, called public identifier IMS, IMPU for "IP Multimedia Public Identity", and information on the bouquets of TV channels to which the user terminal 20 wishes to have access, in the form of an offer of description of the session or "SDP Offer", for "Session Description Protocol”.
  • the message M1 is received by the first entity 12 of the gateway 10 and is relayed to the core IMS network 30, then the application server 34, the latter containing the logic of the service requested by the user terminal.
  • an M2 response message for example a SIP 2000K message, including in particular the first identifier of the user IMPU and, in the form of a session description response or "SDP answer", a set or a list of authorized TV channel packages and for each authorized channel in the set or list, a channel identifier and the multicast IP address.
  • This response message M2 to the IPTV terminal of the user is transmitted through the IMS core network 30, then the gateway 10. The response message M2 is thus received by the gateway 10.
  • the SIP proxy entity 12 determines that the response message M2 corresponds to an agreement to open the session.
  • the application server 34 confirms that the user can access the TV service package No. 1 and gives the list of multicast IP addresses, that is to say the addresses 224.0.70.101 and 224.0. 70.102 in the example above, and the corresponding string identifiers, ie ch1@orange.com and ch2@orange.com still in the example above.
  • the SIP proxy entity 12 obtains from the response message M2 the first identifier of the user, the list of authorized TV channel packages as well as the string identifiers and their respective multicast IP addresses. More precisely, the SIP proxy entity 12 extracts them from the response message M2. The SIP proxy entity 12 also retransmits the response message M2 to the terminal of the user 20. The SIP proxy entity 12 also extracts from the response message M2, more specifically from the IP header of the packet carrying the message. M2 response, a second identifier of the user.
  • the elements obtained from the packet carrying the response message M2 thus consist of user identifiers and the list of allowed multicast IP addresses. These extracted elements are transmitted to the proxy entity for the multicast signaling protocol 14, "IGMP snooping / proxy", of the gateway 10 for example in the form of an M3 message using an API programming interface. , for "Application Programming Interface”.
  • Such an M3 message includes the user's identifiers and the list of allowed multicast IP addresses in the form of filters.
  • the second identifier of the user is for example the IP address of the user's terminal. It is emphasized here that when the gateway 10 implements an address translation function or NAT, that is to say an association between a private IP address used in the private network and a public IP address stored in a table translation, the second identifier does not correspond directly to the IP address extracted from the packet carrying the response message but to the private address read in the translation table.
  • an address translation function or NAT that is to say an association between a private IP address used in the private network and a public IP address stored in a table translation
  • the proxy entity for the multicast signaling protocol 14 receives this message M3 and then stores in a table the list of authorized multicast IP addresses, to which the terminal 20 is able to request access by means of multicast protocol messages, in association with the user's credentials.
  • the SIP proxy entity 12 is able to perform an access control by the terminal 20 to the TV channels.
  • the access control is thus remote from the transfer equipment 32 to the gateway 10, and more precisely its proxy entity for the multicast signaling protocol 14. This avoids significant updates of the transfer equipment.
  • the access authorization information is extracted from messages transmitted by the communication network during the application session negotiation and are therefore reliable.
  • the gateway 10 performs this access control on a limited number of users, which does not complicate the software of the gateway.
  • the proxy entity for the multicast signaling protocol 14 acknowledges by an acknowledgment message M4 the receipt of the message M3.
  • the user terminal 20 Upon receipt of the message M2 response, the user terminal 20 transmits to the gateway 10, more specifically to the SIP 12 proxy entity, an M5 SIP acknowledgment message or "SIP ack". This message M5 is then relayed to the core network IMS 30 and then to the application server 34.
  • the user terminal 20 transmits to the gateway 10, more precisely to the proxy entity for the multicast signaling protocol 14, a message M6 conforming to the multicast signaling protocol, for example an "IGMP Report (S, G1) message.
  • IGMP Report S, G1
  • the terminal of the user 20 requests access to the chain ch1@orange.com, identified by the multicast IP address 224.0.70.101.
  • This M6 access request message is received by the proxy entity for the multicast signaling protocol 14 in a step F3. Still in this step F3, the proxy entity for the multicast signaling protocol 14 checks whether the terminal of the user 20 has the right to access the requested channel. The control is based firstly on the identifier of the requesting terminal included in the M6 access request message to obtain the list of allowed multicast IP addresses and secondly on the multicast IP address contained in the same message. to perform access control.
  • the access request message M6 comprises the second identifier of the user, that is to say the IP address of the terminal.
  • the message M6 comprises a third identifier of the user, for example a MAC address, for "Media Access Control".
  • the gateway 10 determines which second identifier is associated with this third identifier before obtaining the list of allowed multicast IP addresses. It is thus understood that the method as described is easily adaptable to other types of user identifiers.
  • the access request message M6 is transmitted to the communication network, more specifically to the transfer equipment 32.
  • the data flow associated with the TV channel is then transmitted to the terminal of the user 20.
  • the M6 access request message is blocked by the proxy entity for the multicast signaling protocol 14. No message from access request is transmitted to the communication network. The data stream associated with the TV channel is therefore not transmitted to the user's terminal. In an alternative embodiment, the user's terminal 20 is notified of the rejection.
  • the gateway 10 sets up an access control for TV channels for a user terminal 20 having established an application session with the application server 34.
  • the user terminal 20 transmits an M20 message corresponding to a request to stop the first TV channel, for example an "IGMP Leave (S, G1)" message.
  • the message M20 is relayed by the proxy entity for the multicast signaling protocol 14 to the equipment of the transfer plan 32.
  • the transmission of the data stream associated with the first TV channel to the user's terminal is then stopped.
  • the proxy entity for the multicast signaling protocol 14 obtains from the message M20 the second identifier of the user and verifies that the TV channel for which a stop is requested corresponds to a channel authorized for this purpose. user. If this is not the case, the stop request is not relayed. This avoids sending an unjustified stop request to the transfer equipment 32.
  • the user terminal 20 transmits to the gateway 10, more precisely to the proxy entity for the multicast signaling protocol 14, a message M21, corresponding to a request for access to a second channel, for example by a "IGMP Report (S, G2)" message.
  • the proxy entity for the multicast signaling protocol 14 again implements the step F2 described above.
  • the access request message M21 is transmitted to the communication network and the data flow associated with the second TV channel is transmitted to the user's terminal 20.
  • the access request message M21 is blocked and the data stream associated with the second TV channel is not transmitted.
  • the user's terminal 20 is notified of the rejection.
  • the user's terminal 20 transmits an M30 message corresponding to a request to stop broadcasting the first TV channel, for example an "IGMP Leave (S, G1) ".
  • the message M30 is relayed by the proxy entity for the multicast signaling protocol 14 to the transfer equipment 32.
  • the transmission of the data stream associated with the first TV channel to the user's terminal 20 is then stopped.
  • the proxy entity for the multicast signaling protocol 14 can implement access control on this stop request.
  • the user terminal 20 transmits to the gateway 10, more specifically to the SIP proxy entity 12, a message M31 release session, for example "SIP Bye".
  • the SIP proxy entity 12 determines that it is a session release message and extracts from the session release message M31 the first identifier of the user.
  • the SIP 12 proxy entity also extracts the second identifier of the user of the IP header of the packet carrying the message M31. It then transmits the user's identifiers to the proxy entity for the multicast signaling protocol 14, "IGMP snooping / proxy", of the gateway 10, for example in the form of an M32 message using the interface PLC programming, this M32 message requesting the uninstallation of the multicast filters for this user.
  • the proxy entity for the multicast signaling protocol 14 receives this message M32 and then deletes from the table the list of multicast IP addresses associated with the user of the terminal 20.
  • the proxy entity for the multicast signaling protocol 14 acknowledges by an acknowledgment message M33 the receipt of the message M32.
  • the SIP proxy entity 12 relays the message M31 to the core IMS network 30, which forwards it to the application server 34.
  • the application server 34 responds to the terminal of the user 20 by an acknowledgment message M34, for example a "SIP 2000K” message, via the IMS core network 30, and then from the gateway 10, more specifically the SIP proxy 12.
  • an acknowledgment message M34 for example a "SIP 2000K” message
  • a device 100 for access by a user to a data stream broadcast in a communication network will now be described in relation to the figure 5 .
  • Such a device is especially designed to allow access of the user to the communication network.
  • the obtaining module 108 is further arranged to record in the table the set of authorized data flows obtained in association with one or more user identifiers.
  • the relay module 104 of the multicast signaling is furthermore arranged to receive a request for access to a multicast data stream, to command the processing module 106 to receive in return an authorization for transmission or not of the access request and for relay the access request in case of authorization.
  • the access device comprises the two entities as described above.
  • the first entity 12 is arranged to relay messages relating to the application session and the second entity 14 is arranged to relay messages relating to a multicast signaling protocol.
  • the first entity 12 then comprises the modules 102 signaling relays for the session and 108 for obtaining.
  • the second entity 14 then comprises the modules 104 relay multicast signaling, 106 processing an access request and table 110.
  • the access control device may be integrated into a communication network access gateway.
  • the software modules can be stored in or transmitted by a data carrier.
  • a data carrier This may be a hardware storage medium, for example a CD-ROM, a magnetic diskette or a hard disk, or a transmission medium such as an electrical signal, optical or radio, or a telecommunications network.
  • the invention also relates to a system for accessing a broadcast data stream, comprising a device for access by a user to a broadcast data stream as described above and at least one device 32 of the network, arranged to broadcast said stream. of data.
  • the method can easily be transposed to one embodiment, in which the application session is opened using the "http" protocol, for "HyperText Transfer Protocol".
  • a proxy entity for this "http" protocol relating to the application session then obtains from the response message the set of authorized channels for the user, as has been previously described for the SIP protocol.
  • the SIP proxy entity 12 transmits two identifiers of the user to the proxy entity for the multicast signaling protocol 14.
  • Other embodiments are also conceivable, in which only the first identifier of the user, IMPU, is transmitted and stored in table 110 in association with the list of authorized channels.
  • the proxy entity for the multicast signaling protocol 14 receives an access request message M6, M21, it first verifies that the IP address provided in the message corresponds to that of a message. registered terminal and gets in return the first identifier of the user IMPU.
  • the proxy entity for the multicast signaling protocol 14 uses the first identifier obtained to obtain the list of authorized TV channels.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Claims (8)

  1. Verfahren zur Kontrolle des Zugriffs durch einen Benutzer (20, 22) · auf einen in einem Kommunikationsnetz verbreiteten Datenstrom, wobei das Verfahren die folgenden Schritte enthält, die von einer Zugriffsvorrichtung (10, 100) durchgeführt werden, mittels der der Benutzer auf das Netz zugreift:
    - Erhalt (F1) einer Einheit von genehmigten Datenströmen ausgehend von einer von der Zugriffsvorrichtung empfangenen und für den Benutzer bestimmten Mitteilung, wobei die Mitteilung sich auf eine Anwendungssitzung zwischen dem Benutzer und einer Dienstplattform (34) bezieht;
    - Empfang (F3) einer Zugriffsanforderung des Benutzers auf den Datenstrom;
    - Überprüfung (F3), dass der Strom nicht zu der Einheit von genehmigten Datenströmen gehört, die für den Benutzer erhalten wurde;
    - Zurückweisung der Zugriffsanforderung.
  2. Zugriffskontrollverfahren nach Anspruch 1, das außerdem einen Schritt (F2) der Registrierung in einer Tabelle der Einheit enthält, die in Verbindung mit dem Benutzer erhalten wurde.
  3. Zugriffskontrollverfahren nach Anspruch 2, das außerdem bei Empfang einer Mitteilung der Unterbrechung der Anwendungssitzung einen Schritt (F5) des Löschens der dem Benutzer zugeordneten Registrierung aus der Tabelle enthält.
  4. Zugriffskontrollverfahren nach Anspruch 1, das außerdem die folgenden Schritte enthält:
    - Empfang einer Anforderung des Anhaltens der Verbreitung eines Datenstroms;
    - Überprüfung, dass der Datenstrom nicht zu der Einheit von genehmigten Datenströmen gehört, die für den Benutzer erhalten wurde;
    - Zurückweisung der Anhalteanforderung.
  5. Vorrichtung (10, 100) für den Zugriff durch einen Benutzer auf einen in einem Kommunikationsnetz verbreiteten Datenstrom, die eingerichtet ist, um einen Zugriff des Benutzers auf das Netz zu erlauben:
    - Einrichtungen (108) zum Erhalt einer Einheit von genehmigten Datenströmen ausgehend von einer von der Zugriffsvorrichtung empfangenen und für den Benutzer bestimmten Mitteilung, wobei die Mitteilung sich auf eine Anwendungssitzung zwischen dem Benutzer und einer Dienstplattform bezieht;
    - Einrichtungen (104) zum Empfang einer Zugriffsanforderung des Benutzers auf den Datenstrom;
    - Einrichtungen (106) zur Verarbeitung der Zugriffsanforderung, die eingerichtet sind, um die Zugriffsanforderung zurückzuweisen, wenn der Strom nicht zu der Einheit von für den Benutzer genehmigten Datenströmen gehört.
  6. Zugriffs-Gateway auf ein Kommunikationsnetz für mindestens einen Benutzer, das ein erstes Modul (12), das eingerichtet ist, um Mitteilungen bezüglich der Anwendungssitzung weiterzuleiten, und ein zweites Modul (14) enthält, das eingerichtet ist, um Mitteilungen bezüglich eines Multicast-Signalisierungsprotokolls weiterzuleiten, wobei:
    - das erste Modul außerdem eingerichtet ist, um eine Einheit von genehmigten Datenströmen ausgehend von einer von der Zugriffsvorrichtung empfangenen und für den Benutzer bestimmten Mitteilung zu erhalten, wobei die Mitteilung sich auf eine Anwendungssitzung zwischen dem Benutzer und einer Dienstplattform bezieht;
    - das zweite Modul außerdem eingerichtet ist, um eine Zugriffsanforderung des Benutzers auf einen im Netz verbreiteten Datenstrom zu empfangen, um zu überprüfen, dass der Strom nicht zu der Einheit von für den Benutzer genehmigten Datenströmen gehört, und um die Zugriffsanforderung zurückzuweisen.
  7. Zugriffssystem auf einen verbreiteten Datenstrom, das eine Zugriffsvorrichtung durch einen Benutzer auf einen verbreiteten Datenstrom nach Anspruch 5 und mindestens eine Ausrüstung des Netzes enthält, eingerichtet, um den Datenstrom zu verbreiten.
  8. Computerprogramm, das Anweisungen zur Durchführung des Zugriffskontrollverfahrens nach Anspruch 1 aufweist, die von einer Zugriffsvorrichtung durchgeführt werden, wenn dieses Programm von einem Prozessor ausgeführt wird.
EP11719332.6A 2010-04-09 2011-04-05 Verfahren zum zugriff auf einem ausgestrahlten datenflusses Active EP2556646B1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1052704 2010-04-09
PCT/FR2011/050755 WO2011124834A1 (fr) 2010-04-09 2011-04-05 Technique de controle d'acces a un flux de donnees diffuse

Publications (2)

Publication Number Publication Date
EP2556646A1 EP2556646A1 (de) 2013-02-13
EP2556646B1 true EP2556646B1 (de) 2016-12-21

Family

ID=43466908

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11719332.6A Active EP2556646B1 (de) 2010-04-09 2011-04-05 Verfahren zum zugriff auf einem ausgestrahlten datenflusses

Country Status (2)

Country Link
EP (1) EP2556646B1 (de)
WO (1) WO2011124834A1 (de)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020258753A1 (zh) * 2019-06-28 2020-12-30 烽火通信科技股份有限公司 一种基于融合终端的智能插件运行方法及系统
US20220272102A1 (en) * 2021-02-24 2022-08-25 Cisco Technology, Inc. Creating Network-Based Consent Contracts

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9027088B2 (en) 2012-06-14 2015-05-05 Ericsson Modems Sa Systems and methods for protection of a SIP back-to-back user agent on modems
US12021754B2 (en) 2021-02-24 2024-06-25 Cisco Technology, Inc. Enforcing consent contracts to manage network traffic

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040240466A1 (en) 2000-11-29 2004-12-02 Brian Unitt Access control enhancements for delivery of video and other services
US20050220132A1 (en) 2004-03-30 2005-10-06 Packetfront Sweden Ab Multicast
US20090089843A1 (en) 2007-09-27 2009-04-02 Kahn Raynold M Method and system for providing content to a content distribution system suitable for a multiple dwelling unit using an authorization list
US20090235347A1 (en) 2008-03-12 2009-09-17 Yahoo! Inc. Method and system for securely streaming content
EP2124385A1 (de) 2007-06-04 2009-11-25 Huawei Technologies Co., Ltd. Verfahren, vorrichtung und system zur steuerung der authorisierung für einen multicast-dienst
US7644429B2 (en) 1997-03-21 2010-01-05 Nagra Thomson Licensing Broadcast and reception, and conditional access system therefor
US20100046528A1 (en) 2008-08-21 2010-02-25 Telefonaktiebolaget Lm Ericsson (Publ) Intelligent IMS Gateway for Legacy DSLAMs

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644429B2 (en) 1997-03-21 2010-01-05 Nagra Thomson Licensing Broadcast and reception, and conditional access system therefor
US20040240466A1 (en) 2000-11-29 2004-12-02 Brian Unitt Access control enhancements for delivery of video and other services
US20050220132A1 (en) 2004-03-30 2005-10-06 Packetfront Sweden Ab Multicast
EP2124385A1 (de) 2007-06-04 2009-11-25 Huawei Technologies Co., Ltd. Verfahren, vorrichtung und system zur steuerung der authorisierung für einen multicast-dienst
US20090089843A1 (en) 2007-09-27 2009-04-02 Kahn Raynold M Method and system for providing content to a content distribution system suitable for a multiple dwelling unit using an authorization list
US20090235347A1 (en) 2008-03-12 2009-09-17 Yahoo! Inc. Method and system for securely streaming content
US20100046528A1 (en) 2008-08-21 2010-02-25 Telefonaktiebolaget Lm Ericsson (Publ) Intelligent IMS Gateway for Legacy DSLAMs

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BITAR ET AL.: "Applicability of Access Node Control Mechanism to PON based Broadband Networks", DRAFT-BITAR-WADHWA-ANCP-PON-03.TXT, 7 March 2010 (2010-03-07), pages 1 - 64, XP055421860

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020258753A1 (zh) * 2019-06-28 2020-12-30 烽火通信科技股份有限公司 一种基于融合终端的智能插件运行方法及系统
US20220272102A1 (en) * 2021-02-24 2022-08-25 Cisco Technology, Inc. Creating Network-Based Consent Contracts

Also Published As

Publication number Publication date
WO2011124834A1 (fr) 2011-10-13
EP2556646A1 (de) 2013-02-13

Similar Documents

Publication Publication Date Title
EP2025181B1 (de) System zum zugriff auf ein ip-fernsehdienst in einem ims-architektur-netzwerk
EP2556646B1 (de) Verfahren zum zugriff auf einem ausgestrahlten datenflusses
Ludwig et al. Xep-0166: Jingle
WO2016156694A1 (fr) Procédé de priorisation de flux médias dans un réseau de communications
EP3476108B1 (de) Verfahren, computer programm und vorrichtung zum bereitstellen einer adresse durch eine zu verwaltende vorrichtung eines netzwerks
US8356325B2 (en) System and method for transferring a session across domains and subscriptions
EP2332332A1 (de) Verfahren und einrichtung zum umlenken einer datenflussüberwachungsanfrage
US8542603B2 (en) Distributed resource management in networks
EP2266279B1 (de) Gemeinsame nutzung von multimedia-inhalten über eine audio-video-kommunikation
KR20110000593A (ko) 멀티캐스트 스트림을 이용하여 주문형 스트리밍 콘텐츠의 제공을 촉진하기 위한 방법 및 장치
WO2011144846A1 (fr) Technique d'acces a un service par un utilisateur
EP3808060A1 (de) Verfahren zur nachrichtenverarbeitung durch eine vorrichtung eines voice-over-ip-netzes
EP2504957B1 (de) Zugriff auf referenzierungsinhalten mit einem inhaltsserver
EP2614630B1 (de) Verarbeitung von daten zur benachrichtung einer vorrichtung
EP3050275B1 (de) Verbesserte protokollumwandlung in einem telekommunikationsnetz zur bereitstellung von diensten mit verbesserter dienstgüte
US8285866B2 (en) System and method for streaming content
EP2365686B9 (de) Verfahren und Vorrichtung zur Telefonanrufverarbeitung in einem Kommunikationsnetz welches nomadische Endgeräte wie Softphone Endgeräte umfasst
Mikoczy et al. Combinational services of NGN based IPTV
Abd-Elrahman et al. Open-IPTV Services and Architectures
WO2014114871A1 (fr) Enregistrement d'un equipement client par l'intermediaire d'un serveur mandataire dans un reseau de communication
FR2988885A1 (fr) Base de donnees, serveur hss, et serveurs de controle d'un reseau ims
FR2916552A1 (fr) Procede de transcodage de sessions de type sip.
Meyer Extended Personal Media Networks (XPMN)
FR2968874A1 (fr) Gestion de service dans un reseau

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20121018

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ORANGE

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20160307

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 856341

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170115

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602011033599

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 7

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170321

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170322

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 856341

Country of ref document: AT

Kind code of ref document: T

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170421

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170421

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170321

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

REG Reference to a national code

Ref country code: DE

Ref legal event code: R026

Ref document number: 602011033599

Country of ref document: DE

PLBI Opposition filed

Free format text: ORIGINAL CODE: 0009260

26 Opposition filed

Opponent name: FREEBOX

Effective date: 20170921

PLAX Notice of opposition and request to file observation + time limit sent

Free format text: ORIGINAL CODE: EPIDOSNOBS2

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PLAU Termination of opposition procedure: information related to despatch of decision deleted

Free format text: ORIGINAL CODE: EPIDOSDOPC1

PLBD Termination of opposition procedure: decision despatched

Free format text: ORIGINAL CODE: EPIDOSNOPC1

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

PLBP Opposition withdrawn

Free format text: ORIGINAL CODE: 0009264

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170430

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170430

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170405

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20170430

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 8

PLAN Information deleted related to communication of a notice of opposition and request to file observations + time limit

Free format text: ORIGINAL CODE: EPIDOSDOBS2

PLAX Notice of opposition and request to file observation + time limit sent

Free format text: ORIGINAL CODE: EPIDOSNOBS2

PLBB Reply of patent proprietor to notice(s) of opposition received

Free format text: ORIGINAL CODE: EPIDOSNOBS3

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170430

PLCK Communication despatched that opposition was rejected

Free format text: ORIGINAL CODE: EPIDOSNREJ1

REG Reference to a national code

Ref country code: DE

Ref legal event code: R100

Ref document number: 602011033599

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

PLBN Opposition rejected

Free format text: ORIGINAL CODE: 0009273

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: OPPOSITION REJECTED

27O Opposition rejected

Effective date: 20180927

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20110405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161221

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602011033599

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04L0029060000

Ipc: H04L0065000000

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20240320

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20240320

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20240320

Year of fee payment: 14